Gotowa bibliografia na temat „Cryptographic cloud architecture”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Cryptographic cloud architecture”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Cryptographic cloud architecture"
TN, Nikhil. "Exploring on Cloud Security Landscapes:A Comprehensive Review." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34217.
Pełny tekst źródłaDr., R. Sridevi*1 &. C. B. Banupriya2. "A SURVEY ON CRYPTOGRAPHIC CLOUD STORAGE TECHNIQUES." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 7 (2017): 602–5. https://doi.org/10.5281/zenodo.829787.
Pełny tekst źródłaKaranam, Madhavi, Sahithi Reddy S, Abhinav Chakilam, and Srinu Banothu. "Performance Evaluation of Cryptographic Security Algorithms on Cloud." E3S Web of Conferences 391 (2023): 01015. http://dx.doi.org/10.1051/e3sconf/202339101015.
Pełny tekst źródłaThakur, Gaurav. "Enhancing Secure Cloud Storage: A Four-Tier Architecture with ChaCha20 Encryption, Blake3 Hashing, and Dynamic Chunk Allocation in Multi-Cloud Environment." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 497–507. https://doi.org/10.22214/ijraset.2025.70183.
Pełny tekst źródłaHathout, Basma Badawi, Samy Ghoniemy, and Osman Ibrahim. "A Modified Cloud-Based Cryptographic Agent for Cloud Data Integrity." International Journal of Interactive Mobile Technologies (iJIM) 11, no. 2 (2017): 6. http://dx.doi.org/10.3991/ijim.v11i2.6553.
Pełny tekst źródłaAiello, Samuel. "How Cryptography Can Augment Zero Trust." International Journal of Blockchain Technologies and Applications 1, no. 1 (2023): 52–60. http://dx.doi.org/10.18178/ijbta.2023.1.1.52-60.
Pełny tekst źródłaBhuite, Prof S. S. "A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47316.
Pełny tekst źródłaAbhale, Babasaheb Annasaheb, and Rohita Yamaganti Dr. "Mitigating cybersecurity risks in cloud computing through cryptographic protocols and service architecture." International Journal of Trends in Emerging Research and Development 2, no. 6 (2024): 153–59. https://doi.org/10.5281/zenodo.15239402.
Pełny tekst źródłaChen, Yilin. "Comparative Analysis of the Centralized and Decentralized Architecture of Cloud Computing in terms of Privacy Security." Applied and Computational Engineering 145, no. 1 (2025): 51–56. https://doi.org/10.54254/2755-2721/2025.21867.
Pełny tekst źródłaFairosebanu, Abdul Azis, and Antony Cruz Nisha Jebaseeli. "Data security in cloud environment using cryptographic mechanism." Bulletin of Electrical Engineering and Informatics 12, no. 1 (2023): 462–71. http://dx.doi.org/10.11591/eei.v12i1.4590.
Pełny tekst źródłaRozprawy doktorskie na temat "Cryptographic cloud architecture"
Nimgaonkar, Satyajeet. "Secure and Energy Efficient Execution Frameworks Using Virtualization and Light-weight Cryptographic Components." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc699986/.
Pełny tekst źródłaRatnayake, Yohan. "PKI based Encryption for Document Sharing, Optimized Storage, and Proof of Existence in the Cloud." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-182906.
Pełny tekst źródłaMughaid, Ala' Said Mohammad. "Modelling and simulation of a new cloud computing platform based on the SPEEDOS operating system." Thesis, 2018. http://hdl.handle.net/1959.13/1395111.
Pełny tekst źródłaCzęści książek na temat "Cryptographic cloud architecture"
Lu, Huawei, and Hao Han. "Research on Architecture of Cryptographic Cloud Service Based on Domestic Cryptographic Technology." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-4967-9_153.
Pełny tekst źródłaQiao, Huidong, Jiangchun Ren, Zhiying Wang, Haihe Ba, Huaizhe Zhou, and Tie Hong. "OBC Based Optimization of Re-encryption for Cryptographic Cloud Storage." In Algorithms and Architectures for Parallel Processing. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49583-5_46.
Pełny tekst źródłaGhule, Neeraj, Aashish Bhongade, Ashish Ranjan, Rahul Bangad, and Balaji Patil. "Intelligent Content-Based Hybrid Cryptography Architecture for Securing File Storage Over Cloud." In Proceedings of International Conference on Communication and Artificial Intelligence. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6546-9_36.
Pełny tekst źródłaLimkar, Suresh, Rajas N. Bhalerao, Priya D. Shinde, and Abhishek B. Raut. "Multi-owner Architecture System Using Visual Cryptography and Watermarking for Secure Ownership in Cloud Environment." In Smart Computing and Informatics. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-5547-8_61.
Pełny tekst źródłaKausalye, Shekhar S., and Sanjeev Kumar Sharma. "Data Confidentiality in Cloud Storage. A Survey." In Recent Trends in Intensive Computing. IOS Press, 2021. http://dx.doi.org/10.3233/apc210257.
Pełny tekst źródłaDeng, Mina, Milan Petkovic, Marco Nalin, and Ilaria Baroni. "Home Healthcare in Cloud Computing." In Handbook of Research on ICTs and Management Systems for Improving Efficiency in Healthcare and Social Care. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-3990-4.ch032.
Pełny tekst źródłaDeng, Mina, Milan Petkovic, Marco Nalin, and Ilaria Baroni. "Home Healthcare in Cloud Computing." In Healthcare Administration. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6339-8.ch031.
Pełny tekst źródłaThakare, Vaishali Ravindra, and John Singh K. "Secure Group Key Sharing Protocols and Cloud System." In Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7492-7.ch007.
Pełny tekst źródłaThakare, Vaishali Ravindra, and John Singh K. "Secure Group Key Sharing Protocols and Cloud System." In Encyclopedia of Information Science and Technology, Fourth Edition. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-2255-3.ch145.
Pełny tekst źródłaGouru, Navya, and NagaLakshmi Vadlamani. "DistProv-Data Provenance in Distributed Cloud for Secure Transfer of Digital Assets with Ethereum Blockchain using ZKP." In Cyber Warfare and Terrorism. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch053.
Pełny tekst źródłaStreszczenia konferencji na temat "Cryptographic cloud architecture"
Yuvarani, R., and R. Mahaveerakannan. "Expert in Payment Security and IoT Cloud Architecture for Banking, Specializing in Cryptographic Techniques." In 2025 8th International Conference on Trends in Electronics and Informatics (ICOEI). IEEE, 2025. https://doi.org/10.1109/icoei65986.2025.11013769.
Pełny tekst źródłaLiu, Shuwen, and George C. Polyzos. "SovereignEdge: A Context-Aware Cryptographic Architecture for Data Sovereignty in Mobile Edge–Fog–Cloud IoT Data Spaces." In 2025 8th World Conference on Computing and Communication Technologies (WCCCT). IEEE, 2025. https://doi.org/10.1109/wccct65447.2025.11027965.
Pełny tekst źródłaWani, Abdul Raoof, Q. P. Rana, and Nitin Pandey. "Cloud security architecture based on user authentication and symmetric key cryptographic techniques." In 2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, 2017. http://dx.doi.org/10.1109/icrito.2017.8342485.
Pełny tekst źródłaKumar, Arvind, Ashish Gholve, and Kedar Kotalwar. "Automotive Security Solution Using Hardware Security Module (HSM)." In International Automotive CAE Conference – Road to Virtual World. SAE International, 2024. http://dx.doi.org/10.4271/2024-28-0037.
Pełny tekst źródłaStorch, Mauro, Vinícius Meyer, Avelino Zorzo, and Cesar A. F. De Rose. "A Modular Architecture and a Cost-Model to Estimate the Overhead of Implementing Confidentiality in Cloud Computing Environments." In Simpósio em Sistemas Computacionais de Alto Desempenho. Sociedade Brasileira de Computação, 2024. http://dx.doi.org/10.5753/sscad.2024.244780.
Pełny tekst źródłaHayward, Ryan, and Chia-Chu Chiang. "An Architecture for Parallelizing Fully Homomorphic Cryptography on Cloud." In 2013 7th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS). IEEE, 2013. http://dx.doi.org/10.1109/cisis.2013.139.
Pełny tekst źródłaBouzerna, Nabil, Renaud Sirdey, Oana Stan, Thanh Hai Nguyen, and Philippe Wolf. "An Architecture for Practical Confidentiality-Strengthened Face Authentication Embedding Homomorphic Cryptography." In 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, 2016. http://dx.doi.org/10.1109/cloudcom.2016.0069.
Pełny tekst źródłaWang, Chen, Tengyan Wang, Chuan He, and Yong Li. "Software-define cloud-edge collaborative defense architecture against unknown attacks." In CNSCT 2024: 2024 3rd International Conference on Cryptography, Network Security and Communication Technology. ACM, 2024. http://dx.doi.org/10.1145/3673277.3673280.
Pełny tekst źródłaBerlato, Stefano, Roberto Carbone, Adam J. Lee, and Silvio Ranise. "Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization." In ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security. ACM, 2020. http://dx.doi.org/10.1145/3320269.3384767.
Pełny tekst źródłaRaporty organizacyjne na temat "Cryptographic cloud architecture"
Leathers, Emily, Clayton Thurmer, and Kendall Niles. Encryption for edge computing applications. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48596.
Pełny tekst źródła